SlideShare a Scribd company logo
Master version 0.0.2
DMARC
Domain-based Message
Authentication Reporting & Conformance
Martijn Groeneweg General Manager Europe, dmarcian
Wesley Rietveld Sales Director Europe, dmarcian
Marco Franceschetti, Head of Deliverability, Contactlab
2
© Copyright 2017-2019 Contactlab
This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner.
Why you should care!
DMARC?
Should you as an email marketer care about DMARC?
Why is domain authentication important? Why are there always new standards coming from the email ecosystem?
Is it a mandatory requirement?
Is it about security?
3
© Copyright 2017-2019 Contactlab
This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner.
Gmail wants it
Source: https://support.google.com/mail/answer/81126?hl=en
4
© Copyright 2017-2019 Contactlab
This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner.
Gmail wants it
5
© Copyright 2017-2019 Contactlab
This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner.
Authentication: SPF
SPF – Path based on email’s path from the Sender (Contactlab) to the Mailbox provider.
Works on "Envelope From" domain. Not on the "From" domain.
Is it 100% sure?
Sender /
@example.com
IP address DNS Server/
SPF Record
Valid authentication? Yes / No MBP – filter
mix
6
© Copyright 2017-2019 Contactlab
This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner.
Authentication: DKIM
DKIM – "validating a domain name identity that is associated with a message through cryptographic
authentication".
"DomainKeys Identified Mail (DKIM) lets an organization take responsibility for a message that is in
transit. The organization is a handler of the message, either as its originator or as an intermediary. Their
reputation is the basis for evaluating whether to trust the message for further handling, such as delivery. "
www.dkim.org
Is it a 100% sure method?
7
© Copyright 2017-2019 Contactlab
This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner.
What DMARC brings
Source: https://support.google.com/a/answer/2466580
“You'll receive a daily report from each participating email provider so you can see how
often your messages are authenticated, how often invalid messages are identified,
and policy actions requested and taken by IP address.”
Protect your domain with DMARC
• Who we are
• Why DMARC?
• How DMARC works
• Let’s phish Polizia di Stato and Banca d’Italia
• PostNL case
• Questions
Agenda
Who we are
• Started in 2012
• dmarcian is the leading “Full Service” provider of
DMARC Services
• dmarcian has a regionalized European operations that
meets European data requirements
• dmarcian offers
– Web based tooling
– Deployment support
– Support packages
Who we are
• Customers
– Banks, top internet properties, marketing agencies, telecoms
and commercial enterprises of all sizes
– More than 19.000 companies and organizations
– More than 2.000.000 domains
• About 25 people
– CEO and founder Tim Draegen is primary author of DMARC
spec and currently one of the chairs of the IETF DMARC
working group
– Scott Kitterman is one of the primary authors of SPF
Who we are
Why DMARC?
Why DMARC?
For any given email:
Real or Not Real?
Why DMARC?
Why DMARC?
“95% of all attacks on enterprise networks are the results from
successful spear phishing”
Allen Paller, Director of Research - SANS Institute
“The FBI reports a $2.3 Billion Loss to Spear Phishing
and CEO Email Scams from Oct 2013 to Aug 2016.
Since January 2015, the FBI has seen a 270% increase
in Cybersecurity attacks.”
fbi.gov
Why DMARC?
Phishing is threat for online trust
• Monetary loss
• Remediation cost
• Reputation cost
Cost of phishing
DMARC fixes email
Gmail question mark
Why DMARC
• Delivery
Use the same modern plumbing that mega
companies use to deliver email.
• Security
Disallow unauthorized use of your email domain to
protect people from spam, fraud, and phishing.
• Visibility
Gain visibility into who and what across the
Internet is sending email using your email domain.
• Identity
Make your email easy to identify across the huge
and growing footprint of DMARC-capable receivers.
How DMARC works
• DNS entry (TXT record _dmarc.example.com)
• Builds on existing email authentication technology
(SPF and DKIM)
• Provides feedback data to Domain Owners
• Allows for blocking of unauthorized email
How DMARC works
DMARC Policy
1. p=none
Monitoring, no impact on mailflows
2. p=quarantine
Deliver to spam folder
3. p=reject
Block email that fails the DMARC check
Return-Path: <foe@SAMPLE.net>
Delivered-To: friend@example.org
Authentication-Results: mail.example.org; spf=pass (example.org: domain
of foe@sample.net designates 1.2.3.4 as permitted sender)
smtp.mail=foe@sample.net; dkim=pass header.i=@sample.net
Received: from ..
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=SAMPLE.net;
s=february_2014; i=@sample.net; q=dns/txt; h= .. ; bh= .. ; b= ..
Date: Wed, 19 Feb 2014 12:39:06 -0500
From: “Fred“ <foe@CLIENT.net>
To: “Frank Riend” <friend@example.org>
Subject: REMINDER – don’t mess this up, Frank!
Hi, please don’t forget about the meeting. It’s very important!
Your friend,
Fred
DMARC on From domain
DKIM: d= domain
SPF on Envelope domain = Mail From = Return Path
misalignment
DMARC
To tie it all together. For a piece of email to be considered compliant with DMARC, the domain found in an email’s
From: header must match either the SPF-validated domain or the originating domain found in a valid DKIM signature.
If the domains match, receivers can safely assert that the email did come from the domain that it purports to come
from. This is how easy-to-identify email is made possible.
FAIL
Return-Path: <foe@CLIENT.net>
Delivered-To: friend@example.org
Authentication-Results: mail.example.org; spf=pass (example.org: domain
of foe@sample.net designates 1.2.3.4 as permitted sender)
smtp.mail=foe@sample.net; dkim=pass header.i=@sample.net
Received: from ..
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=CLIENT.net;
s=february_2014; i=@sample.net; q=dns/txt; h= .. ; bh= .. ; b= ..
Date: Wed, 19 Feb 2014 12:39:06 -0500
From: “Fred“ <foe@CLIENT.net>
To: “Frank Riend” <friend@example.org>
Subject: REMINDER – don’t mess this up, Frank!
Hi, please don’t forget about the meeting. It’s very important!
Your friend,
Fred
DMARC on From domain
DKIM: d= domain
SPF on Envelope domain = Mail From = Return Path
alignment
DMARC
To tie it all together. For a piece of email to be considered compliant with DMARC, the domain found in an email’s
From: header must match either the SPF-validated domain or the originating domain found in a valid DKIM signature.
If the domains match, receivers can safely assert that the email did come from the domain that it purports to come
from. This is how easy-to-identify email is made possible.
PASS on SPF & DKIM
Let’s phish Polizia di Stato
and Banca d’Italia
Polizia di Stato
Polizia di Stato
Polizia di Stato
Polizia di Stato
Polizia di Stato
Internet.nl
Internet.nl
Internet.nl
Internet.nl
Do it the right way
PostNL case
Protect your domain with DMARC
Protect your domain with DMARC
Protect your domain with DMARC
Protect your domain with DMARC
PostNL
Other customer
Protect your domain with DMARC
Protect your domain with DMARC
PostNL DMARC ROI
•Reduced customer support
90.000 euro per year
•Reduced cost of domain
registrations
20.000 euro per year
•Break even period
2 years (looking at direct cost only)
Q&A Session
49
© Copyright 2017-2019 Contactlab
This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner.
WEBINAR CONTACTLAB
http://contactlab.com/it/landing/webinar/
HOME > EVENTI E RISORSE > WEBINAR
See you next year
Contacthub
Thank you!
Marco Franceschetti
Head of Deliverability
marco.fraceschetti@contactlab.com
Wesley Rietveld
Sales Director Europe, dmarcian
wesley@dmarcian.com
Martijn Groeneweg
General Manager Europe, dmarcian
martijn@dmarcian.com
Ad

More Related Content

What's hot (20)

44CON 2014 - Meterpreter Internals, OJ Reeves
44CON 2014 - Meterpreter Internals, OJ Reeves44CON 2014 - Meterpreter Internals, OJ Reeves
44CON 2014 - Meterpreter Internals, OJ Reeves
44CON
 
Spam, security
Spam, securitySpam, security
Spam, security
Тамара Рытова
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?
Evernym
 
Customer retention
Customer retentionCustomer retention
Customer retention
Vijyata Singh
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
KrutiShah114
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
Noorhidayu Yussof
 
Email security
Email securityEmail security
Email security
Indrajit Sreemany
 
dark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdfdark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdf
RajanshumanPradhan2
 
Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction ppt
Subhash Gupta
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
Ali Raw
 
Digital signature
Digital  signatureDigital  signature
Digital signature
AJAL A J
 
Digital signature
Digital signatureDigital signature
Digital signature
Praseela R
 
Kerberos protocol
Kerberos protocolKerberos protocol
Kerberos protocol
Ajit Dadresa
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
Maven Logix
 
Phishing
PhishingPhishing
Phishing
Syeda Javeria
 
Email security
Email securityEmail security
Email security
Ahmed EL-KOSAIRY
 
Abusing Microsoft Kerberos - Sorry you guys don't get it
Abusing Microsoft Kerberos - Sorry you guys don't get itAbusing Microsoft Kerberos - Sorry you guys don't get it
Abusing Microsoft Kerberos - Sorry you guys don't get it
Benjamin Delpy
 
Digital signature Brief Introduction
Digital signature Brief IntroductionDigital signature Brief Introduction
Digital signature Brief Introduction
Ganesh Kothe
 
Enumeration et Exploitation
Enumeration et Exploitation Enumeration et Exploitation
Enumeration et Exploitation
Abdul Baacit Coulibaly
 
Spam
Spam Spam
Spam
Senchu Thomas
 
44CON 2014 - Meterpreter Internals, OJ Reeves
44CON 2014 - Meterpreter Internals, OJ Reeves44CON 2014 - Meterpreter Internals, OJ Reeves
44CON 2014 - Meterpreter Internals, OJ Reeves
44CON
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?
Evernym
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
KrutiShah114
 
Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction ppt
Subhash Gupta
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
Ali Raw
 
Digital signature
Digital  signatureDigital  signature
Digital signature
AJAL A J
 
Digital signature
Digital signatureDigital signature
Digital signature
Praseela R
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
Maven Logix
 
Abusing Microsoft Kerberos - Sorry you guys don't get it
Abusing Microsoft Kerberos - Sorry you guys don't get itAbusing Microsoft Kerberos - Sorry you guys don't get it
Abusing Microsoft Kerberos - Sorry you guys don't get it
Benjamin Delpy
 
Digital signature Brief Introduction
Digital signature Brief IntroductionDigital signature Brief Introduction
Digital signature Brief Introduction
Ganesh Kothe
 

Similar to Protect your domain with DMARC (20)

2017 Deliverabilty & Beyond - What Eloquans Need to Know
2017 Deliverabilty & Beyond - What Eloquans Need to Know2017 Deliverabilty & Beyond - What Eloquans Need to Know
2017 Deliverabilty & Beyond - What Eloquans Need to Know
Chris Arrendale
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYCUsing Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Return Path
 
GoDMARC - Block Email Phishing
GoDMARC - Block Email PhishingGoDMARC - Block Email Phishing
GoDMARC - Block Email Phishing
Tarun Arora
 
Getting startedwithdmarc5
 Getting startedwithdmarc5 Getting startedwithdmarc5
Getting startedwithdmarc5
grafica_corella
 
B2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the InboxB2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the Inbox
B2BCamp
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - LA
Using Return Path Data to Protect Your Brand: Security Breakout Session - LAUsing Return Path Data to Protect Your Brand: Security Breakout Session - LA
Using Return Path Data to Protect Your Brand: Security Breakout Session - LA
Return Path
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - London
Using Return Path Data to Protect Your Brand: Security Breakout Session - LondonUsing Return Path Data to Protect Your Brand: Security Breakout Session - London
Using Return Path Data to Protect Your Brand: Security Breakout Session - London
Return Path
 
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
Gangcai Lin
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fv
cactussky
 
DMARC Implementation across all domains
DMARC Implementation across all domainsDMARC Implementation across all domains
DMARC Implementation across all domains
CTM360
 
Fighting Email Abuse with DMARC
Fighting Email Abuse with DMARCFighting Email Abuse with DMARC
Fighting Email Abuse with DMARC
Kurt Andersen
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofing
MattChapman50
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Return Path
 
How Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email AuthenticationHow Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email Authentication
Return Path
 
Email 101
Email 101Email 101
Email 101
Forfront Ltd
 
Don't Get Phished!
Don't Get Phished!Don't Get Phished!
Don't Get Phished!
Peter Schmidt
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Return Path
 
Jak ochránit vaší značku a doménu s technologií DMARC
Jak ochránit vaší značku a doménu s technologií DMARCJak ochránit vaší značku a doménu s technologií DMARC
Jak ochránit vaší značku a doménu s technologií DMARC
Mailkit
 
Authentication & Reputation, Adding Business Value In The Real World
Authentication & Reputation, Adding Business Value In The Real WorldAuthentication & Reputation, Adding Business Value In The Real World
Authentication & Reputation, Adding Business Value In The Real World
jprice
 
How an Enterprise SPAM Filter Works
How an Enterprise SPAM Filter Works How an Enterprise SPAM Filter Works
How an Enterprise SPAM Filter Works
Pinpointe On-Demand
 
2017 Deliverabilty & Beyond - What Eloquans Need to Know
2017 Deliverabilty & Beyond - What Eloquans Need to Know2017 Deliverabilty & Beyond - What Eloquans Need to Know
2017 Deliverabilty & Beyond - What Eloquans Need to Know
Chris Arrendale
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYCUsing Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Return Path
 
GoDMARC - Block Email Phishing
GoDMARC - Block Email PhishingGoDMARC - Block Email Phishing
GoDMARC - Block Email Phishing
Tarun Arora
 
Getting startedwithdmarc5
 Getting startedwithdmarc5 Getting startedwithdmarc5
Getting startedwithdmarc5
grafica_corella
 
B2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the InboxB2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the Inbox
B2BCamp
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - LA
Using Return Path Data to Protect Your Brand: Security Breakout Session - LAUsing Return Path Data to Protect Your Brand: Security Breakout Session - LA
Using Return Path Data to Protect Your Brand: Security Breakout Session - LA
Return Path
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - London
Using Return Path Data to Protect Your Brand: Security Breakout Session - LondonUsing Return Path Data to Protect Your Brand: Security Breakout Session - London
Using Return Path Data to Protect Your Brand: Security Breakout Session - London
Return Path
 
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
Gangcai Lin
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fv
cactussky
 
DMARC Implementation across all domains
DMARC Implementation across all domainsDMARC Implementation across all domains
DMARC Implementation across all domains
CTM360
 
Fighting Email Abuse with DMARC
Fighting Email Abuse with DMARCFighting Email Abuse with DMARC
Fighting Email Abuse with DMARC
Kurt Andersen
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofing
MattChapman50
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Return Path
 
How Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email AuthenticationHow Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email Authentication
Return Path
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Return Path
 
Jak ochránit vaší značku a doménu s technologií DMARC
Jak ochránit vaší značku a doménu s technologií DMARCJak ochránit vaší značku a doménu s technologií DMARC
Jak ochránit vaší značku a doménu s technologií DMARC
Mailkit
 
Authentication & Reputation, Adding Business Value In The Real World
Authentication & Reputation, Adding Business Value In The Real WorldAuthentication & Reputation, Adding Business Value In The Real World
Authentication & Reputation, Adding Business Value In The Real World
jprice
 
How an Enterprise SPAM Filter Works
How an Enterprise SPAM Filter Works How an Enterprise SPAM Filter Works
How an Enterprise SPAM Filter Works
Pinpointe On-Demand
 
Ad

More from Contactlab (20)

Come migliorare l’engagement tramite analisi dei dati, algoritmi predittivi e...
Come migliorare l’engagement tramite analisi dei dati, algoritmi predittivi e...Come migliorare l’engagement tramite analisi dei dati, algoritmi predittivi e...
Come migliorare l’engagement tramite analisi dei dati, algoritmi predittivi e...
Contactlab
 
Digital Competitive Map Contemporary 2019 - Abstract
Digital Competitive Map Contemporary 2019 - AbstractDigital Competitive Map Contemporary 2019 - Abstract
Digital Competitive Map Contemporary 2019 - Abstract
Contactlab
 
Artificial Intelligence or Artificial Dummies? Come istruire la macchina a no...
Artificial Intelligence or Artificial Dummies? Come istruire la macchina a no...Artificial Intelligence or Artificial Dummies? Come istruire la macchina a no...
Artificial Intelligence or Artificial Dummies? Come istruire la macchina a no...
Contactlab
 
User journeys: FATTI non PAROLE.Come analizzare i processi di acquisto e usar...
User journeys: FATTI non PAROLE.Come analizzare i processi di acquisto e usar...User journeys: FATTI non PAROLE.Come analizzare i processi di acquisto e usar...
User journeys: FATTI non PAROLE.Come analizzare i processi di acquisto e usar...
Contactlab
 
Personas & Journeys
Personas & JourneysPersonas & Journeys
Personas & Journeys
Contactlab
 
Conosci il vero significato dei tuoi dati con Analytics!
Conosci il vero significato dei tuoi dati con Analytics!Conosci il vero significato dei tuoi dati con Analytics!
Conosci il vero significato dei tuoi dati con Analytics!
Contactlab
 
Strategia di personalizzazione omnichannel
Strategia di personalizzazione omnichannelStrategia di personalizzazione omnichannel
Strategia di personalizzazione omnichannel
Contactlab
 
Algoritmi e modelli predittivi per arricchire il profilo unico dei tuoi utenti.
Algoritmi e modelli predittivi per arricchire il profilo unico dei tuoi utenti.Algoritmi e modelli predittivi per arricchire il profilo unico dei tuoi utenti.
Algoritmi e modelli predittivi per arricchire il profilo unico dei tuoi utenti.
Contactlab
 
Gestisci e automatizza le tue azioni di marketing su un'unica piattaforma.
Gestisci e automatizza le tue azioni di marketing su un'unica piattaforma.Gestisci e automatizza le tue azioni di marketing su un'unica piattaforma.
Gestisci e automatizza le tue azioni di marketing su un'unica piattaforma.
Contactlab
 
GDPR: è iniziato il countdown
GDPR: è iniziato il countdownGDPR: è iniziato il countdown
GDPR: è iniziato il countdown
Contactlab
 
NEW EDITION! Il caso del “luxury feeling”: best practice sull’esperienza d’ac...
NEW EDITION! Il caso del “luxury feeling”: best practice sull’esperienza d’ac...NEW EDITION! Il caso del “luxury feeling”: best practice sull’esperienza d’ac...
NEW EDITION! Il caso del “luxury feeling”: best practice sull’esperienza d’ac...
Contactlab
 
CONTACTONE: COSTRUISCI RELAZIONI SOLIDE E DURATURE CON I TUOI CLIENTI E MIGLI...
CONTACTONE: COSTRUISCI RELAZIONI SOLIDE E DURATURE CON I TUOI CLIENTI E MIGLI...CONTACTONE: COSTRUISCI RELAZIONI SOLIDE E DURATURE CON I TUOI CLIENTI E MIGLI...
CONTACTONE: COSTRUISCI RELAZIONI SOLIDE E DURATURE CON I TUOI CLIENTI E MIGLI...
Contactlab
 
Metodologia Agile in Contactlab
Metodologia Agile in ContactlabMetodologia Agile in Contactlab
Metodologia Agile in Contactlab
Contactlab
 
Welfare in Contactlab
Welfare in ContactlabWelfare in Contactlab
Welfare in Contactlab
Contactlab
 
Caso Costa. Personalizzare l'esperienza oltre la crociera.
Caso Costa. Personalizzare l'esperienza oltre la crociera.Caso Costa. Personalizzare l'esperienza oltre la crociera.
Caso Costa. Personalizzare l'esperienza oltre la crociera.
Contactlab
 
Il viaggio di un'architettura: dal monolite ad un ecosistema di API ed eventi
Il viaggio di un'architettura: dal monolite ad un ecosistema di API ed eventiIl viaggio di un'architettura: dal monolite ad un ecosistema di API ed eventi
Il viaggio di un'architettura: dal monolite ad un ecosistema di API ed eventi
Contactlab
 
Creare UI semplici, intuitive ed efficaci con la Pattern Library di Contactla...
Creare UI semplici, intuitive ed efficaci con la Pattern Library di Contactla...Creare UI semplici, intuitive ed efficaci con la Pattern Library di Contactla...
Creare UI semplici, intuitive ed efficaci con la Pattern Library di Contactla...
Contactlab
 
So cosa hai fatto: dietro le quinte del Data-driven marketing
So cosa hai fatto: dietro le quinte del Data-driven marketingSo cosa hai fatto: dietro le quinte del Data-driven marketing
So cosa hai fatto: dietro le quinte del Data-driven marketing
Contactlab
 
Contactone: il modello di sviluppo che favorisce la relazione diretta con il ...
Contactone: il modello di sviluppo che favorisce la relazione diretta con il ...Contactone: il modello di sviluppo che favorisce la relazione diretta con il ...
Contactone: il modello di sviluppo che favorisce la relazione diretta con il ...
Contactlab
 
API, SDK e Plugin: raccogliere e integrare i dati, abilitare un profilo consu...
API, SDK e Plugin: raccogliere e integrare i dati, abilitare un profilo consu...API, SDK e Plugin: raccogliere e integrare i dati, abilitare un profilo consu...
API, SDK e Plugin: raccogliere e integrare i dati, abilitare un profilo consu...
Contactlab
 
Come migliorare l’engagement tramite analisi dei dati, algoritmi predittivi e...
Come migliorare l’engagement tramite analisi dei dati, algoritmi predittivi e...Come migliorare l’engagement tramite analisi dei dati, algoritmi predittivi e...
Come migliorare l’engagement tramite analisi dei dati, algoritmi predittivi e...
Contactlab
 
Digital Competitive Map Contemporary 2019 - Abstract
Digital Competitive Map Contemporary 2019 - AbstractDigital Competitive Map Contemporary 2019 - Abstract
Digital Competitive Map Contemporary 2019 - Abstract
Contactlab
 
Artificial Intelligence or Artificial Dummies? Come istruire la macchina a no...
Artificial Intelligence or Artificial Dummies? Come istruire la macchina a no...Artificial Intelligence or Artificial Dummies? Come istruire la macchina a no...
Artificial Intelligence or Artificial Dummies? Come istruire la macchina a no...
Contactlab
 
User journeys: FATTI non PAROLE.Come analizzare i processi di acquisto e usar...
User journeys: FATTI non PAROLE.Come analizzare i processi di acquisto e usar...User journeys: FATTI non PAROLE.Come analizzare i processi di acquisto e usar...
User journeys: FATTI non PAROLE.Come analizzare i processi di acquisto e usar...
Contactlab
 
Personas & Journeys
Personas & JourneysPersonas & Journeys
Personas & Journeys
Contactlab
 
Conosci il vero significato dei tuoi dati con Analytics!
Conosci il vero significato dei tuoi dati con Analytics!Conosci il vero significato dei tuoi dati con Analytics!
Conosci il vero significato dei tuoi dati con Analytics!
Contactlab
 
Strategia di personalizzazione omnichannel
Strategia di personalizzazione omnichannelStrategia di personalizzazione omnichannel
Strategia di personalizzazione omnichannel
Contactlab
 
Algoritmi e modelli predittivi per arricchire il profilo unico dei tuoi utenti.
Algoritmi e modelli predittivi per arricchire il profilo unico dei tuoi utenti.Algoritmi e modelli predittivi per arricchire il profilo unico dei tuoi utenti.
Algoritmi e modelli predittivi per arricchire il profilo unico dei tuoi utenti.
Contactlab
 
Gestisci e automatizza le tue azioni di marketing su un'unica piattaforma.
Gestisci e automatizza le tue azioni di marketing su un'unica piattaforma.Gestisci e automatizza le tue azioni di marketing su un'unica piattaforma.
Gestisci e automatizza le tue azioni di marketing su un'unica piattaforma.
Contactlab
 
GDPR: è iniziato il countdown
GDPR: è iniziato il countdownGDPR: è iniziato il countdown
GDPR: è iniziato il countdown
Contactlab
 
NEW EDITION! Il caso del “luxury feeling”: best practice sull’esperienza d’ac...
NEW EDITION! Il caso del “luxury feeling”: best practice sull’esperienza d’ac...NEW EDITION! Il caso del “luxury feeling”: best practice sull’esperienza d’ac...
NEW EDITION! Il caso del “luxury feeling”: best practice sull’esperienza d’ac...
Contactlab
 
CONTACTONE: COSTRUISCI RELAZIONI SOLIDE E DURATURE CON I TUOI CLIENTI E MIGLI...
CONTACTONE: COSTRUISCI RELAZIONI SOLIDE E DURATURE CON I TUOI CLIENTI E MIGLI...CONTACTONE: COSTRUISCI RELAZIONI SOLIDE E DURATURE CON I TUOI CLIENTI E MIGLI...
CONTACTONE: COSTRUISCI RELAZIONI SOLIDE E DURATURE CON I TUOI CLIENTI E MIGLI...
Contactlab
 
Metodologia Agile in Contactlab
Metodologia Agile in ContactlabMetodologia Agile in Contactlab
Metodologia Agile in Contactlab
Contactlab
 
Welfare in Contactlab
Welfare in ContactlabWelfare in Contactlab
Welfare in Contactlab
Contactlab
 
Caso Costa. Personalizzare l'esperienza oltre la crociera.
Caso Costa. Personalizzare l'esperienza oltre la crociera.Caso Costa. Personalizzare l'esperienza oltre la crociera.
Caso Costa. Personalizzare l'esperienza oltre la crociera.
Contactlab
 
Il viaggio di un'architettura: dal monolite ad un ecosistema di API ed eventi
Il viaggio di un'architettura: dal monolite ad un ecosistema di API ed eventiIl viaggio di un'architettura: dal monolite ad un ecosistema di API ed eventi
Il viaggio di un'architettura: dal monolite ad un ecosistema di API ed eventi
Contactlab
 
Creare UI semplici, intuitive ed efficaci con la Pattern Library di Contactla...
Creare UI semplici, intuitive ed efficaci con la Pattern Library di Contactla...Creare UI semplici, intuitive ed efficaci con la Pattern Library di Contactla...
Creare UI semplici, intuitive ed efficaci con la Pattern Library di Contactla...
Contactlab
 
So cosa hai fatto: dietro le quinte del Data-driven marketing
So cosa hai fatto: dietro le quinte del Data-driven marketingSo cosa hai fatto: dietro le quinte del Data-driven marketing
So cosa hai fatto: dietro le quinte del Data-driven marketing
Contactlab
 
Contactone: il modello di sviluppo che favorisce la relazione diretta con il ...
Contactone: il modello di sviluppo che favorisce la relazione diretta con il ...Contactone: il modello di sviluppo che favorisce la relazione diretta con il ...
Contactone: il modello di sviluppo che favorisce la relazione diretta con il ...
Contactlab
 
API, SDK e Plugin: raccogliere e integrare i dati, abilitare un profilo consu...
API, SDK e Plugin: raccogliere e integrare i dati, abilitare un profilo consu...API, SDK e Plugin: raccogliere e integrare i dati, abilitare un profilo consu...
API, SDK e Plugin: raccogliere e integrare i dati, abilitare un profilo consu...
Contactlab
 
Ad

Recently uploaded (20)

How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 

Protect your domain with DMARC

  • 1. Master version 0.0.2 DMARC Domain-based Message Authentication Reporting & Conformance Martijn Groeneweg General Manager Europe, dmarcian Wesley Rietveld Sales Director Europe, dmarcian Marco Franceschetti, Head of Deliverability, Contactlab
  • 2. 2 © Copyright 2017-2019 Contactlab This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner. Why you should care! DMARC? Should you as an email marketer care about DMARC? Why is domain authentication important? Why are there always new standards coming from the email ecosystem? Is it a mandatory requirement? Is it about security?
  • 3. 3 © Copyright 2017-2019 Contactlab This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner. Gmail wants it Source: https://support.google.com/mail/answer/81126?hl=en
  • 4. 4 © Copyright 2017-2019 Contactlab This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner. Gmail wants it
  • 5. 5 © Copyright 2017-2019 Contactlab This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner. Authentication: SPF SPF – Path based on email’s path from the Sender (Contactlab) to the Mailbox provider. Works on "Envelope From" domain. Not on the "From" domain. Is it 100% sure? Sender / @example.com IP address DNS Server/ SPF Record Valid authentication? Yes / No MBP – filter mix
  • 6. 6 © Copyright 2017-2019 Contactlab This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner. Authentication: DKIM DKIM – "validating a domain name identity that is associated with a message through cryptographic authentication". "DomainKeys Identified Mail (DKIM) lets an organization take responsibility for a message that is in transit. The organization is a handler of the message, either as its originator or as an intermediary. Their reputation is the basis for evaluating whether to trust the message for further handling, such as delivery. " www.dkim.org Is it a 100% sure method?
  • 7. 7 © Copyright 2017-2019 Contactlab This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner. What DMARC brings Source: https://support.google.com/a/answer/2466580 “You'll receive a daily report from each participating email provider so you can see how often your messages are authenticated, how often invalid messages are identified, and policy actions requested and taken by IP address.”
  • 8. Protect your domain with DMARC
  • 9. • Who we are • Why DMARC? • How DMARC works • Let’s phish Polizia di Stato and Banca d’Italia • PostNL case • Questions Agenda
  • 11. • Started in 2012 • dmarcian is the leading “Full Service” provider of DMARC Services • dmarcian has a regionalized European operations that meets European data requirements • dmarcian offers – Web based tooling – Deployment support – Support packages Who we are
  • 12. • Customers – Banks, top internet properties, marketing agencies, telecoms and commercial enterprises of all sizes – More than 19.000 companies and organizations – More than 2.000.000 domains • About 25 people – CEO and founder Tim Draegen is primary author of DMARC spec and currently one of the chairs of the IETF DMARC working group – Scott Kitterman is one of the primary authors of SPF Who we are
  • 15. For any given email: Real or Not Real? Why DMARC?
  • 17. “95% of all attacks on enterprise networks are the results from successful spear phishing” Allen Paller, Director of Research - SANS Institute “The FBI reports a $2.3 Billion Loss to Spear Phishing and CEO Email Scams from Oct 2013 to Aug 2016. Since January 2015, the FBI has seen a 270% increase in Cybersecurity attacks.” fbi.gov Why DMARC?
  • 18. Phishing is threat for online trust
  • 19. • Monetary loss • Remediation cost • Reputation cost Cost of phishing
  • 22. Why DMARC • Delivery Use the same modern plumbing that mega companies use to deliver email. • Security Disallow unauthorized use of your email domain to protect people from spam, fraud, and phishing. • Visibility Gain visibility into who and what across the Internet is sending email using your email domain. • Identity Make your email easy to identify across the huge and growing footprint of DMARC-capable receivers.
  • 24. • DNS entry (TXT record _dmarc.example.com) • Builds on existing email authentication technology (SPF and DKIM) • Provides feedback data to Domain Owners • Allows for blocking of unauthorized email How DMARC works
  • 25. DMARC Policy 1. p=none Monitoring, no impact on mailflows 2. p=quarantine Deliver to spam folder 3. p=reject Block email that fails the DMARC check
  • 26. Return-Path: <[email protected]> Delivered-To: [email protected] Authentication-Results: mail.example.org; spf=pass (example.org: domain of [email protected] designates 1.2.3.4 as permitted sender) [email protected]; dkim=pass [email protected] Received: from .. DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=SAMPLE.net; s=february_2014; [email protected]; q=dns/txt; h= .. ; bh= .. ; b= .. Date: Wed, 19 Feb 2014 12:39:06 -0500 From: “Fred“ <[email protected]> To: “Frank Riend” <[email protected]> Subject: REMINDER – don’t mess this up, Frank! Hi, please don’t forget about the meeting. It’s very important! Your friend, Fred DMARC on From domain DKIM: d= domain SPF on Envelope domain = Mail From = Return Path misalignment DMARC To tie it all together. For a piece of email to be considered compliant with DMARC, the domain found in an email’s From: header must match either the SPF-validated domain or the originating domain found in a valid DKIM signature. If the domains match, receivers can safely assert that the email did come from the domain that it purports to come from. This is how easy-to-identify email is made possible. FAIL
  • 27. Return-Path: <[email protected]> Delivered-To: [email protected] Authentication-Results: mail.example.org; spf=pass (example.org: domain of [email protected] designates 1.2.3.4 as permitted sender) [email protected]; dkim=pass [email protected] Received: from .. DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=CLIENT.net; s=february_2014; [email protected]; q=dns/txt; h= .. ; bh= .. ; b= .. Date: Wed, 19 Feb 2014 12:39:06 -0500 From: “Fred“ <[email protected]> To: “Frank Riend” <[email protected]> Subject: REMINDER – don’t mess this up, Frank! Hi, please don’t forget about the meeting. It’s very important! Your friend, Fred DMARC on From domain DKIM: d= domain SPF on Envelope domain = Mail From = Return Path alignment DMARC To tie it all together. For a piece of email to be considered compliant with DMARC, the domain found in an email’s From: header must match either the SPF-validated domain or the originating domain found in a valid DKIM signature. If the domains match, receivers can safely assert that the email did come from the domain that it purports to come from. This is how easy-to-identify email is made possible. PASS on SPF & DKIM
  • 28. Let’s phish Polizia di Stato and Banca d’Italia
  • 38. Do it the right way
  • 47. PostNL DMARC ROI •Reduced customer support 90.000 euro per year •Reduced cost of domain registrations 20.000 euro per year •Break even period 2 years (looking at direct cost only)
  • 49. 49 © Copyright 2017-2019 Contactlab This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner. WEBINAR CONTACTLAB http://contactlab.com/it/landing/webinar/ HOME > EVENTI E RISORSE > WEBINAR See you next year Contacthub
  • 50. Thank you! Marco Franceschetti Head of Deliverability [email protected] Wesley Rietveld Sales Director Europe, dmarcian [email protected] Martijn Groeneweg General Manager Europe, dmarcian [email protected]